Vulnerabilities > CVE-1999-0997
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
PARTIAL Integrity impact
PARTIAL Availability impact
PARTIAL Summary
wu-ftp with FTP conversion enabled allows an attacker to execute commands via a malformed file name that is interpreted as an argument to the program that does the conversion, e.g. tar or uncompress.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 | |
Application | 3 | |
OS | 3 |
Exploit-Db
description | wu-ftpd 2.4.2/2.5 .0/2.6 .0/2.6.1/2.6.2 FTP Conversion Vulnerability. CVE-1999-0997. Remote exploit for unix platform |
id | EDB-ID:20563 |
last seen | 2016-02-02 |
modified | 1999-12-20 |
published | 1999-12-20 |
reporter | suid |
source | https://www.exploit-db.com/download/20563/ |
title | wu-ftpd 2.4.2/2.5 .0/2.6.0/2.6.1/2.6.2 - FTP Conversion Vulnerability |
Nessus
NASL family | Debian Local Security Checks |
NASL id | DEBIAN_DSA-377.NASL |
description | wu-ftpd, an FTP server, implements a feature whereby multiple files can be fetched in the form of a dynamically constructed archive file, such as a tar archive. The names of the files to be included are passed as command line arguments to tar, without protection against them being interpreted as command-line options. GNU tar supports several command line options which can be abused, by means of this vulnerability, to execute arbitrary programs with the privileges of the wu-ftpd process. Georgi Guninski pointed out that this vulnerability exists in Debian woody. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 15214 |
published | 2004-09-29 |
reporter | This script is Copyright (C) 2004-2019 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/15214 |
title | Debian DSA-377-1 : wu-ftpd - insecure program execution |
code |
|
Statements
contributor | Joshua Bressers |
lastmodified | 2006-09-27 |
organization | Red Hat |
statement | Red Hat does not consider CVE-1999-0997 to be a security vulnerability. The wu-ftpd process chroots itself into the target ftp directory and will only run external commands as the user logged into the ftp server. Because the process chroots itself, an attacker needs a valid login with write access to the ftp server, and even then they could only potentially execute commands as themselves. |